


default search action
Cryptography, Volume 3
Volume 3, Number 1, March 2019
- Muhammad Rezal Kamel Ariffin, Saidu Isah Abubakar
, Faridah Yunos, Muhammad Asyraf Asbullah
:
New Cryptanalytic Attack on RSA Modulus N = pq Using Small Prime Difference Method. 2 - Asad Ali Siyal
, Aisha Zahid Junejo
, Muhammad Zawish
, Kainat Ahmed, Aiman Khalil
, Georgia Soursou
:
Applications of Blockchain Technology in Medicine and Healthcare: Challenges and Future Perspectives. 3 - Ashutosh Dhar Dwivedi
, Shalini Dhar
, Gautam Srivastava
, Rajani Singh
:
Cryptanalysis of Round-Reduced Fantomas, Robin and iSCREAM. 4 - Acknowledgement to Reviewers of Cryptography in 2018. 5
- Yasir Naseer, Tariq Shah, Dawood Shah, Sadam Hussain:
A Novel Algorithm of Constructing Highly Nonlinear S-p-boxes. 6 - Karuna Pande Joshi
, Agniva Banerjee:
Automating Privacy Compliance Using Policy Integrated Blockchain. 7 - Le Van Luyen:
An Improved Identity-Based Multivariate Signature Scheme Based on Rainbow. 8 - Luigi Accardi, Satoshi Iriyama
, Koki Jimbo, Massimo Regoli
:
A New Class of Strongly Asymmetric PKA Algorithms: SAA-5. 9 - Syed Kamran Haider
, Marten van Dijk:
Flat ORAM: A Simplified Write-Only Oblivious RAM Construction for Secure Processors. 10
Volume 3, Number 2, June 2019
- Ayoub Mars
, Wael Adi:
New Family of Stream Ciphers as Physically Clone-Resistant VLSI-Structures. 11 - Bhupendra Nath Tiwari, Jude Kibinde Kuipo, Joshua Muyiwa Adeegbe, Ninoslav Marina
:
Optimized AKS Primality Testing: A Fluctuation Theory Perspective. 12 - Tariq Shah, Ayesha Qureshi:
S-Box on Subgroup of Galois Field. 13 - Mohamad Ali Mehrabi
:
Improved Sum of Residues Modular Multiplication Algorithm. 14 - Sally Lin Pei Ching, Faridah Yunos
:
Effect of Self-Invertible Matrix on Cipher Hexagraphic Polyfunction. 15 - Ibou Sene
, Abdoul Aziz Ciss
, Oumar Niang:
I2PA: An Efficient ABC for IoT. 16
Volume 3, Number 3, September 2019
- Md Shahed Enamul Quadir
, John A. Chandy
:
Key Generation for Hardware Obfuscation Using Strong PUFs. 17 - Jeff Calhoun, Cyrus Minwalla
, Charles Helmich, Fareena Saqib, Wenjie Che, Jim Plusquellic
:
Physical Unclonable Function (PUF)-Based e-Cash Transaction Protocol (PUF-Cash). 18 - Maki Kihara
, Satoshi Iriyama:
New Authentication Algorithm Based on Verifiable Encryption with Digital Identity. 19 - Sitalakshmi Venkatraman
, Anthony Overmars
:
New Method of Prime Factorisation-Based Attacks on RSA Authentication in IoT. 20 - Amit Phadikar
, Poulami Jana, Himadri S. Mandal:
Reversible Data Hiding for DICOM Image Using Lifting and Companding. 21 - Kai-Min Chung
, Marios Georgiou, Ching-Yi Lai
, Vassilis Zikas:
Cryptography with Disposable Backdoors. 22 - Matthew Campagna, Shay Gueron:
Key Management Systems at the Cloud Scale. 23 - Alzahraa J. Mohammed, Ali A. Yassin
:
Efficient and Flexible Multi-Factor Authentication Protocol Based on Fuzzy Extractor of Administrator's Fingerprint and Smart Mobile Device. 24
Volume 3, Number 4, December 2019
- Lukas Fladung
, Georgios M. Nikolopoulos
, Gernot Alber
, Marc Fischlin:
Intercept-Resend Emulation Attacks against a Continuous-Variable Quantum Authentication Protocol with Physical Unclonable Keys. 25 - Niraj Kumar
:
Practically Feasible Robust Quantum Money with Classical Verification. 26 - Brian Coyle
, Elham Kashefi, Matty J. Hoban:
Certified Randomness From Steering Using Sequential Measurements. 27 - Saleh Mulhem
, Wael Adi:
New Mathblocks-Based Feistel-Like Ciphers for Creating Clone-Resistant FPGA Devices. 28

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.